[CompNetSec] - 03 - Classical Encryption Techniques
This lecture covers classical encryption techniques, including an introduction, the symmetric cipher model, relevant definitions, and a simplified model of symmetric encryption.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
* Intro (time: 0:00)
* Symmetric Cipher Model (slide(s): 3-7, time: 1:14)
- Definitions (slide(s): 4, time: 1:55)
- Simplified Model of Symmetric Encryption (slide(s): 5-7, time: 4:03)
* Cryptographic Systems (slide(s): 8, time: 11:30)
* Cryptanalysis and Brute-Force Attack (slide(s): 9, time: 14:14)
- Cryptanalysis (slide(s): 9, time: 14:44)
- Brute-Force (slide(s): 9, time: 14:40)
* Types of Attacks (slide(s): 10, time: 19:38)
- Ciphertext only (slide(s): 10, time: 19:43)
- Known Plaintext (slide(s): 10, time: 20:09)
- Chosen Plaintext (slide(s): 10, time: 20:44)
- Chosen Chipter (slide(s): 10, time: 22:46)
- Chosen Text (slide(s): 10, time: 22:59)
* Encryption Scheme Security (slide(s): 11, time: 23:39)
- Unconditionally Secure (slide(s): 11, time: 24:18)
- Computationally Secure (slide(s): 11, time: 24:47)
* Brute-Force Attack (slide(s): 12, time: 27:05)
* Substitution Techniques (slide(s): 13-28, time: 28:57)
- Caesar Cipher (slide(s): 14-16, time: 30:29)
- Refer to {Part 1, slide(s): 15} (slide(s): 15, time: 34:58)
- Monoalphabetic Cipher (slide(s): 17-19, time: 37:58)
- Playfair Cipher (slide(s): 20-21, time: 45:18)
- Polyalphabetic Ciphers (slide(s): 22, time: 52:20)
- Vigenère Cipher (slide(s): 23-24, time: 53:43)
- [Improvement] Vigenère Autokey System (slide(s): 25, time: 58:00)
- Vernam Cipher (slide(s): 26, time: 1:00:01)
- [Improvement] One-Time Pad (slide(s): 27-28, time: 1:04:54)
* Transposition (slide(s): 29, 1:09:51)
- Row Transposition Cipher (slide(s): 29, time: 1:10:07)
* Steganography (slide(s): 30, time: 1:12:14)
* Other Steganography Techniques (slide(s): 31, time: 1:15:31)
* Steganography vs. Encryption (slide(s): 32, time: 1:17:22)
* Summary (slide(s): 33, time: 1:19:22)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security
Video Information
Views
14.6K
Total views since publication
Duration
01:20:02
Video length
Published
Oct 23, 2020
Release date
Quality
hd
Video definition